What are some barriers to action that people provide for not giving care?Answer: Presence of bystanders, uncertainty about the victim, the nature...
What can bystanders do to help you after you check the scene?
What can bystanders do to help you after you check the scene?Answer: Direct traffic, meet the ambulance, help you give first aid, provide information...
What is the most important thing you can do in an emergency?
What is the most important thing you can do in an emergency?Answer: Get professional help on the scene as soon as possible (call 9...
What is the citizen responder's first step in an emergency?
What is the citizen responder's first step in an emergency?Answer: To recognize that an emergency exi...
Which of the following attributes is most consistent with those suffering from mania?
Which of the following attributes is most consistent with those suffering from mania?Answer: Periods of excess ene...
The preferred method of treatment for seasonal affective disorder is
The preferred method of treatment for seasonal affective disorder isAnswer: Light ther...
One neurotransmitter that seems to be important in the treatment of depression is
One neurotransmitter that seems to be important in the treatment of depression isAnswer: Seroto...
Which of the following is the best initial treatment for a person with moderate to severe depression?
Which of the following is the best initial treatment for a person with moderate to severe depression?Answer: Drug of psychother...
Symptoms of post traumatic stress disorder include
Symptoms of post traumatic stress disorder includeAnswer: Re-experiencing the trauma in dre...
An example of an compulsion
An example of an compulsionAnswer: constant and repetitive checking that the alarm is ...
A condition that causes the sufferer to worry excessively and uncontrollably about future threats is called
A condition that causes the sufferer to worry excessively and uncontrollably about future threats is calledAnswer: Generalized anxiety disor...
Fear of public speaking is a(n)?
Fear of public speaking is a(n)?Answer: Social pho...
A person who focuses on the negative and expects failure is called a(n)
A person who focuses on the negative and expects failure is called a(n)Answer: Pessim...
A defense mechanism by which unacceptable inner impulses are attributed to others is
A defense mechanism by which unacceptable inner impulses are attributed to others isAnswer: Project...
Stability, as it relates to self-esteem, is best described as
Stability, as it relates to self-esteem, is best described asAnswer: A complete absence of mixed messages about oneself from oth...
People with established identities tend to do all of the following EXCEPT
People with established identities tend to do all of the following EXCEPTAnswer: Remain isola...
Our early identity models are most likely to be
Our early identity models are most likely to beAnswer: Pare...
The conflict of Erikson's first stage of development is between
The conflict of Erikson's first stage of development is betweenAnswer: trust and mistr...
Which of the following is a component of treatment in acceptance and commitment therapy (ACT), one of the newer therapy options for those suffering from psychological disorders?
Which of the following is a component of treatment in acceptance and commitment therapy (ACT), one of the newer therapy options for those suffering from...
Maslow would NOT have described a self-actualized person as
Maslow would NOT have described a self-actualized person asAnswer: Focused on the way things should be instead of the way they ...
Which of the following statements regarding psychological health is TRUE?
Which of the following statements regarding psychological health is TRUE?Answer: Psychological health can be defined as either the absence of sickness...
What are the 6 steps to reset a password to recover a lost router password?
What are the 6 steps to reset a password to recover a lost router password?Step 11. Type config t.Step 12. Type enable secret password to change the enable...
What are the 2 steps to access NVRM to recover a lost router password?
What are the 2 steps to access NVRM to recover a lost router password?Step 9: Type copy start run to copy the startup config into memory. Step 10:...
What are the 4 steps to bypass the startup to recover a lost router password?
What are the 4 steps to bypass the startup to recover a lost router password?Step 5: Type confreg 0x2142 at the rommon 1> prompt. This causes...
What are the 4 steps to prepare the device to recover a lost router password?
What are the 4 steps to prepare the device to recover a lost router password?Step 1: Connect to the console port.Step 2: If you have access to user EXEC...
What are the 4 commands that optimize the use of debug?
What are the 4 commands that optimize the use of debug?(1) service timestamps (2) show processes (3) no debug all (4) terminal moni...
What is used to add a time stamp to a debug message.
What is used to add a time stamp to a debug message. This feature provide information about when debug elements occurred and the duration of time...
What are the 5 considerations when using the debug command?
What are the 5 considerations when using the debug command?Answer: (1) debug gets CPU priority (2) debug can help resolve persistent issues, outweighing...
What command turns all debug commands off?
What command turns all debug commands off?Answer: no debug ...
What are the two commands that are extensively used in day-to-day network administration?
What are the two commands that are extensively used in day-to-day network administration?(1) Show Command (1a) Static information (1b) Low Overhead (1c)...
What are the 4 steps of using xmodem to restore an IOS image?
What are the 4 steps of using xmodem to restore an IOS image?Step 1. Connect the PC of the system administrator to the console port on the affected router.Step...
How does Xmodem work?
How does Xmodem work?allows a system administrator who has a copy of the Cisco IOS image on a PC can restore it to the router by making a console connection...
Between tftpdnld and xmodem, which is faster?
Between tftpdnld and xmodem, which is faster?Answer: tftpd...
Within the 3 steps to restore an IOS what 3 things does the first step include?
Within the 3 steps to restore an IOS what 3 things does the first step include?(1) Connect the PC to the console port on the affected router.(2) Connect...
What are the 3 steps to restore an IOS
What are the 3 steps to restore an IOSStep 1: Connect the devicesStep 2: Boot the router and set the ROMmon variablesStep 3: Enter the tftpdnld command...
If you delete an IOS from flash, what happens?
If you delete an IOS from flash, what happens?The IOS is still running in RAM. As long as you don't reboot, you can copy what is running from ram back...
What is the process of upgrading a system to a newer software version?
What is the process of upgrading a system to a newer software version?(1) Use the copy tftp: flash: command to download the new image from the network...
During the copy process, what does the exclamation points indicate?
During the copy process, what does the exclamation points indicate?Answer: Each exclamation point signifies that one UDP segment has successfully...
What are the three steps to copy an IOS image from flash to the network TFTP server?
What are the three steps to copy an IOS image from flash to the network TFTP server?Step 1. Ping the TFTP server to make sure you have access to it.Step...
What is the process of updating a router?
What is the process of updating a router?(1) Shut down all interfaces not needed to perform the update (2) Back up the current operating system and the...
What are the five parts of the cisco file naming conventions?
What are the five parts of the cisco file naming conventions?(1) First part identities the platform on which the image runs (2) Send part specifies the...
What checks the size of the IOS image, the amount of flash memory,the amount of flash memory available, and the name of all files stored in flash?
What checks the size of the IOS image, the amount of flash memory,the amount of flash memory available, and the name of all files stored in flash?Answer: show...
What three tasks must be completed before changing a CISCO IOS image on the router?
What three tasks must be completed before changing a CISCO IOS image on the router?(1) Determine the memory required for the update.(2) Set up and test...
What is the four phase migration process to simplify network operations and management?
What is the four phase migration process to simplify network operations and management?(1) Plan: Set goals, identify resources, profile network hardware...
What is contained in the Routing configuration overview area?
What is contained in the Routing configuration overview area?Answer: Displays the number of static routes and which routing protocols are config...
What 3 items are contained in the VPN in the configuration overview area?
What 3 items are contained in the VPN in the configuration overview area?(1) Displays the number of active VPN connections, (2) The number of configured...
What 3 items are contained in the Firewall policies in the configuration overview area?
What 3 items are contained in the Firewall policies in the configuration overview area?(1) If a firewall is in place, it displays (2) The number...
What is contained in the interfaces and connections overview area?
What is contained in the interfaces and connections overview area?(1)The number of connections that are up and down, (2) The total number of LAN...
What commands do you use to encrypt OSPF?
What commands do you use to encrypt OSPF?interface s0/0/0ip ospf message-digest-key 1 md5 ciscoip ospf authentication message-digestexitrouter ospf 10 area...
What commands do you use to encrypt EIGRP?
What commands do you use to encrypt EIGRP?key chain EIGRP_KEYkey 1key-string ciscoexitinterface s0/0/0ip authetncation mode eigrip 1 md5ip authentication...
What command makes every interface used by RIP passive?
What command makes every interface used by RIP passive?Answer: passive-interface defa...
What are the commands to configure encryption for RIP?
What are the commands to configure encryption for RIP?key chain RIP_KEYkey 1key-string ciscoint s0/0/0 ip rip authentication mode md5ip rip authentication...
What 5 routing protocols support MD5?
What 5 routing protocols support MD5?Answer: (1) RIPv2 (2) OSPF (3) EIGRP (4) IS-IS (5) ...
What command would you use to place a time limit on telnet connections?
What command would you use to place a time limit on telnet connections?line vty 0 4exec-timeout #m...
What is contained in the router area in the SDM page?
What is contained in the router area in the SDM page?(1) Host Name (2) Hardware (2a) Hardware: shows the router model number, the available and total...
What information does the CISCO SDM home overview page display?
What information does the CISCO SDM home overview page display?(1) Tool Bar (1a) Below the menu bar, it has the SDM wizards and modes you can select (2)...
How do you start the CISCO SDM?
How do you start the CISCO SDM?(1) use HTTPS and put the IP address of the router into the browser. (2) When the username and password dialog box...
What command creates a user account defined with privilege level 15 and Configure SSH and Telnet for local login and privilege level 15?
What command creates a user account defined with privilege level 15 and Configure SSH and Telnet for local login and privilege level 15?ip http authentication...
What command enables HTTPS?
What command enables HTTPS?Answer: ip http secure-ser...
What command enables HTTP?
What command enables HTTP?Answer: ip http ser...
What 4 steps must you do to be able to successfully install SDM?
What 4 steps must you do to be able to successfully install SDM?Answer: (1) Access the router CISCO CLI interface using Telnet or the console connection...
What are tools provided by CISCO SDM for advanced users?
What are tools provided by CISCO SDM for advanced users?Answer: (1) ACL (2) VPN crypto map editor (3) CISCO IOS CLI prev...
What functions does the CISCO SDM smart wizard provide?
What functions does the CISCO SDM smart wizard provide?(1_ Guide users step-by-step through router and security configuration workflow by systematically...
What are examples of devices that can use CISCO SDM?
What are examples of devices that can use CISCO SDM?Answer: (1) computers (2) Rout...
What is the advantage of installing SDM on a PC?
What is the advantage of installing SDM on a PC?Answer: aves router memory, and allows you to use SDM to manage other routers on the netwo...
What is preinstalled by default on all new CISCO integreted service routers?
What is preinstalled by default on all new CISCO integreted service routers?Answer: CISCO ...
What three features does Cisco Security Device Managers provide?
What three features does Cisco Security Device Managers provide?Answer: (1) Provides easy-to-use smart wizards (2) Automates router security management...
What is a web-based device-management tool designed for configuring LAN, WAN, and security features on Cisco IOS software-based routers.
What is a web-based device-management tool designed for configuring LAN, WAN, and security features on Cisco IOS software-based routers.Answer: CISCO...
What commands would you use to prevent logins on a aux line?
What commands would you use to prevent logins on a aux line?line aux 0 no passwordlogine...
What command limits VTY lines to accept connections with the protocols actually needed?
What command limits VTY lines to accept connections with the protocols actually needed?line vty 0 4no transport inputtransport input telnet sshe...
By default, all VTY lines are configured to accept what type of remote connection?
By default, all VTY lines are configured to accept what type of remote connection?Answer: all types of remote connections are accep...
If remote access is required, your options are what two things?
If remote access is required, your options are what two things?Answer: (1) Establish a dedicated management network (1a) This could be accomplished...
Remote access typically involves what 5 types of protocols?
Remote access typically involves what 5 types of protocols?Answer: (1) Telnet (2) Secure Shell (SSH) (3) HTTP (4) HTTP secure (HTTPS) (5) S...
What is the preferred way for an administrator to connect to a device to manage it because it is secure
What is the preferred way for an administrator to connect to a device to manage it because it is secureAnswer: Local Access through the console ...
Even though remote administrative access is more convenient than local access, what is a disadvantage o fusing telnet to do so?
Even though remote administrative access is more convenient than local access, what is a disadvantage o fusing telnet to do so?Answer: Remote administrative...
What 2 things must you do to secure administrative access to routers and switches?
What 2 things must you do to secure administrative access to routers and switches?Answer: (1) Secure the administrative lines (VTY, AUX) (2) Configure...
What command allows the administrator to set the router configuration file to require 10 characters in all passwords
What command allows the administrator to set the router configuration file to require 10 characters in all passwordsAnswer: security passwords min-length...
What 3 features provide secure connectivity?
What 3 features provide secure connectivity?Answer: (1) VPN (2) Trust & Identity (Tight levels of trust) (3) Authenticat...
What allows the administer to configure a type 5 (MD5 hash) password and disable the type 7 password from global config?
What allows the administer to configure a type 5 (MD5 hash) password and disable the type 7 password from global config?Answer: enable secret 2-...
What command allows the administrator to encrypt all passwords in the configuration file from global config?
What command allows the administrator to encrypt all passwords in the configuration file from global config?Answer: service password-encrypt...
What command allows network administrators to set the minimum character length for all router passwords from global config?
What command allows network administrators to set the minimum character length for all router passwords from global config?Answer: security passwords...
What would result in these passwords being displayed in plain text in the running configuration?
What would result in these passwords being displayed in plain text in the running configuration?Answer: enable password (username username password...
What is basically a sentence or phrase that serves as a more secure password?
What is basically a sentence or phrase that serves as a more secure password?Answer: passphr...
What is a recommended method for creating strong complex passwords?
What is a recommended method for creating strong complex passwords?Answer: Passphra...
What are 6 good password practices?
What are 6 good password practices?Answer: (1) Do not write passwords down & leave them in places such as your desk or on your monitor (2)...
What is the most fundamental element in controlling secure access to a router?
What is the most fundamental element in controlling secure access to a router?Answer: Strong passw...
What are the six steps to safeguard a router?
What are the six steps to safeguard a router?Answer: (1) manager router security (2) Secure remote administrative access to routers (3) Logging router...
What are 4 Router security issue solutions?
What are 4 Router security issue solutions?Answer: (1) Physical security (2) Update the router IOS whenever advisable (3) Backup the router configuration...
What is considered to be an important first step in securing the network?
What is considered to be an important first step in securing the network?Answer: Securing routers at the network perime...
Attackers can compromise routers in different ways, and these types of attacks include
Attackers can compromise routers in different ways, and these types of attacks includeAnswer: (1) Trust exploitation attacks (2) IP spoofing (3)...
What are the most obvious targets to malicious users?
What are the most obvious targets to malicious users?Answer: routers (since they are gateways to other networ...
What are the steps to fight a worm attack?
What are the steps to fight a worm attack?Answer: (1) Containment (2) Inoculation (3) Quarantine (4) Treatm...
What roles can CISCO routers act as in SSH?
What roles can CISCO routers act as in SSH?Answer: (1) SSH Client (1a) As a client, a router can SSH to another router (2) SSH Server (2a) As a server,...
What port does SSH use?
What port does SSH use?Answer: port...
What replaced Telnet for providing remote access with connections that support strong privacy and session integrity?
What replaced Telnet for providing remote access with connections that support strong privacy and session integrity?Answer: ...
What are the five steps to configure SSH Security?
What are the five steps to configure SSH Security?Answer: (1) Set Router Parameters (1a) Configure the router hostname (2) Set the domain name (2a)...
What are the 4 steps in securing remote administrative access to routers?
What are the 4 steps in securing remote administrative access to routers?Answer: (1) Set Router Parameters (2) Generate Asymmetric Keys (3) Configure...
What are the eight different logging levels?
What are the eight different logging levels?Answer: (0) Emergencies (1) alerts (2) Critical (3) errors (4) warnings (5) notification (6) informational...
What command will change the timestamps of logs in global config mode?
What command will change the timestamps of logs in global config mode?Answer: service timesta...
What allows you to verify that the router is working properly, has 8 levels,must be received regularly to be effective, and can be forwarded to a variety of locations such as router memeory or syslog server?
What allows you to verify that the router is working properly, has 8 levels,must be received regularly to be effective, and can be forwarded to a variety...
What Router interfaces can be made more secure using commands in interface config mode:
What Router interfaces can be made more secure using commands in interface config mode:Answer: (1) Unused interfaces (1a) shutdown (2) Ad hoc routing...
What are 8 services which should typically be disabled?
What are 8 services which should typically be disabled?Answer: (1) CDP (1a) no cdp run (2) Source routing (2a) no ip source-route (3) Small services...
Subscribe to:
Posts (Atom)